AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

CSCI322 Flashcards

Terms : Hide Images
13060348681Reliabilitymeasure of percentage of time a machine, service and network is usable by the respective user base0
13060348682Integritythe degree in which a data stored in a computer storage can be trusted no to be lost or damaged1
13060348683Securitythe degree in which data stored or in transit through a computer network can be trusted not to be Destroyed, Altered or Disclosed to unauthorized parties2
13060348684Performancewithin some set of constraints, system should run as efficiently as possible and as fast as possible3
13060348685Efficiencya system should be managed in a way that it increases the productivity of the administration staff4
13060348686Ease of Usethe degree in which a user should be able to perform their task in the way they desire5
13060348687Orderthe degree in which the layout,operation or management of a computer system conform to a set of regulatory policy and guidelines6
13060348688Role of the system administrator is to maximize a system's ?RISPEEO ( Reliability, Integrity, Security, Performance, Efficiency, Ease of Use, Order )7
13060348689measure of reliabilityUptime8
13060348690Integrity is largely affected byStorage Design, Administration procedure, Protocol and hardware design9
13060348691Performance can be improved throughCapital Expenditure, Procedures and Policy, Users10
13060348692Factors that affect performanceUnderlying Architecture, Operating Systems, Software design and bugs in software, Tuning of Operating System, Administration and End User Practices11
13060348693Administrator are expected to doInstall Hardware, Install and manage software, set and manage configuration, manage a local documentation, create procedures and policy, Enforcement and Arbitration (Executing Policy e.g. Performing Backups), Advise and Train user and management.12
13060348694Field of Password FileUsername,Encrypted Password Placeholder,UID,GID,GECOS Information/Field,Home Directory,Login Shell13
13060348695Fields of Shadow FileUsername,Encrypted Password,Time since last change, Min time between Change, Max time between Change, Warn this many day before expiry (uname:passwd:last:may:must:warn:expire:disable:rsvd)14
13060348696Formula for AvailabilityMean Time between Failure/(Mean Time To Repair + Mean Time between Failure)15
13060348697!! or :!!: meansThe account is inactive16
13060348698how to change password policy in linuxedit the /etc/login.defs file17
13060348699Fields of /etc/groupname:password:GID:members18
13060348700How to use useradd commandsudo useradd -c "name" -d "/usr/home" -g "primaryGroup" -G "secondaryGroup" -m -s"/bin/bash" username19
13060348701How to disable loginsusermod -L username20
13060348702How to use userdel commanduserdel -r username21
13060348703Commands to manage accountsuseradd, userdel, usermod, groupadd, groupdel, groupmod22
130603487043 Advantages of using sudoIncrease in Accountability, Operator can work without unlimited root privileges, root password known only to several people23
13060348705What is Absolute Pathingthe entire path through the filesystem to get to the actual object24
13060348706What is Relative Pathingthe path to an actual object relative to your current working directory25
13060348707List some common filesystem types in UNIXBFS DOSFS NFS HFS NUCFS S5 SFS UFS VxFS26
13060348708A filesystem can be ?disk partition, a disk-based logical volume, network file server27
13060348709What is sudo ?sudo is a package that allows you to delegate root powers to conventional users.28
13060348710What function does a daemon perform?daemon is a background process that handles requests for services such as print, spooling, and file transfers and is dormant when not required.29
13060348711what is a kernelkernel is a core component that is loaded when you first turn on your computer30
13060348712What is the top level of the filesystem called ?root ("/")31
13060348713How to use mount commandmount /dev/sda /users32
13060348714Describe filesystem structureA Filesystem has : The superblock which contains information about the filesystem in general. the inodes table which contains several inodes, each describing a file or directory and has a unique inode number for identification and contains the file size, data block location, last date modified, permissions and ownership the data which makes up content the file as well as the filename are stored in the data block which are referenced by the inodes.33
13060348715What is a hard linked filea hard linked file is a direct copy of one another as they share the same inode and inode number.34
13060348716What is the command to change ownership of a file and how to use itchown chown username filename35
13060348717what is the command to change the group ownership of a file and how to use itchgrp chgrp grpname filename36
13060348718what is the umask?umask are used to take away permissions on new files and directories immediately after they are created.37
13060348719what is a RAIDraid is a redundant array of inexpensive/independent disks which is a combined storage devices into one virtualized device38
13060348720What is the purpose of RAID1. increase redundancy 2.increase Reliability39
13060348721What is a Parity Dataused by RAID to achieve redundancy. a certain checksum is calculated which then is written to a disk.40
13060348722What is a N+1 RedundancyN+1 Redundancy is where a selected component in a system have a second item to take over should the first one fail41
13060348723What is Full RedundancyFull Redundancy is where two sets of the identical hardware are provided.42
13060348724What is ZFSZFS is a comprehensive approach to storage management which includes the function of logical volume management and RAID43
13060348725What are the features of ZFS1.Dynamic stripping and redundancy 2.Pooled storage 3.Scrubbing 4.Data Compression 5.Copy on write transactions 6.Snapshots & Clones 7.Ability to reconstruct dead devices from healthy devices44
13060348726List of Common UNIX Shells1. Borne Shell (sh) 2.POSIX Shell (sh) 3.Korn shell (ksh) 4.C Shell (csh) 5.BASH Shell (bash)45
13072001184List of Special permissionSet user id (SUID) Set group id (SGID) Sticky bit46
13072014143Read Bitallows user to list the files within the directory47
13072017870Write Bitallows user to create, delete and modify files within the directory and modify the directory's attribute48
13072030462Execute Bitallows user to enter a directory and executes files within them and the directory inside49
13072050694Sticky Bitstates that the files and directories within this directory can only be deleted or renamed by their owner (root).50
13072060825Set User ID (SUID)if set on an executable file, the person executing that file temporarily becomes the owner of that file51
13072067042Set Group ID (SGID)if set on an executable file, the person executing that file temporarily becomes the member of the group that file is attached to52
13072078383Set Sticky Bitif set on a directory in addition to write permission, users can add files to the directory but can only delete the ones they created not others53
13072102251Command to create stripped poolsudo zpool create poolname devices pathname54
13072107500Command to create mirrored poolsudo zpool create mirror poolname devices pathname55
13072119414Command to check the status of poolssudo zpool status / sudo zpool list poolname56
13072121962Command to destroy poolsudo zpool destroy poolname57
13072126961Command to create RAIDZ poolsudo zpool create poolname RAIDZ devices pathname (must contain at least 3 devices)58
13072136296Command to create zfs filesystemsudo zfs create pathname59
13072140558Command to list zfssudo zfs list60
13072144975Command to set quota to zfssudo zfs set quota=size zfsPath61
13072155696Command to change mount point in filesystem (ZFS)sudo zfs mountpoint=/pathname currentpathname62
13072170876Command to create zfs snapshotsudo zfs snapshot zfspathname@snapshotname63
13072177719Command to list zfs snapshotsudo zfs list -l snapshot64
13072181630Command to rollback to a certain snapshotsudo zfs rollback zfspathname@snapshotname65
13072187534Command to create zfs clonesudo zfs clone zfspathname@snapshotname zfspathname/clonename66
13072873077Physical layerprovides the physical connection between computer and network wiring67
13072877249Data Link Layerprovides packing and unpacking bits of data for transmission68
13072882346Network Layerprovides routing of data through computer network69
13072886419Transport LayerConcerned with the error correction and synchronization70
13072892768Session Layerconcerned with the connection establishment between two points71
13072896610Presentation Layerinvolves translating data i.e. ASCII or UNICODE72
13072901932Application Layerprovides functionality to user, security and access to resources73
13072907838Elements of an IP Packet1. Source Address 2. Destination Address 3. Time to Live 4. Options 5. Checksum74
13072938521Classes of IP addressesClass A= 1-126 Class B= 128-191 Class C=192-223 Class D=224-239 Class E=240-254 Ranges 127.x.x.x are reserved for loopback and localhost75
13076251596when is network translation usedit is used when a packets are sent from a host in the internal network its source address are rewritten by the gateway if the destination is outside current network76
13076257028What is ICMP?Internet Control Message Protocol used for error or control message between hosts , not applications Examples: -Destination Unreachable -Source Quench77
13076263033Explain TCP and UDPTCP (Transmission control protocol) -Provides a reliable full duplex virtual circuit. -takes care of packets out of order, re transmit and variable data rates -used where reliable full-duplex data stream is required UDP (User datagram protocl) -A connectionless communication -each packet is stand alone -no error checking -used for situations where virtual circuit is not required78
13076272681Explain Three Way Handshakeboth parties send their initial sequence number via SYN Packets then both parties response to each others sequence number by sending ACK Packets79
13076277308DHCP (Dynamic Host Configuration Protocol)DHCP is a plug and play service that operates when your device first access a network80
13076280514DHCP overview-host broadcast a "DHCP discover" message -DHCP server response with a "DHCP offer" message -host request of an ip address by sending "DHCP request" message -DHCP Server sends ip address by sending "DHCP ack" message81
13076288750Explain Recursive and Non-Recursive ServerNon-Recursive Server -> returns a referral to another authoritative server that are likely to know the answer Recursive Server -> returns the real answers, and error message. it follows on the referral itself, relieving the client of this duty.82
13076293744DNS Records-SOA -NS -A Record -PTR Record -MX -CNAME83
13076296069Explain SOAStart of authority, indicates the begining of a zone contains: - name of the zone - administration for the zone - timeout information84
13076299155Explain NSIdentifies which server are authoritative for a zone85
13076301182Explain A RecordsProvides the name to address mappings in the DNS Database86
13076302444Explain PTR RecordsProvides the address to name mappings in the DNS Database87
13076303882Explain MXMail Exchange record, created to help routing of email88
13076305630Explain CNamedescribes the canonical names for the hosts in the DNS namespace89
13076308399How security is compromised ?-Social Engineering -Software Vulnerabilities -Configuration Errors90

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!